Analysis

  • max time kernel
    1199s
  • max time network
    1202s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 13:04

General

  • Target

    userapi.dll

  • Size

    167KB

  • MD5

    ce75519a7d251a187dbd7e72b53b093a

  • SHA1

    fa103591148ab8478a84ce25db28ece2e678bd02

  • SHA256

    59559e97962e40a15adb2237c4d01cfead03623aff1725616caeaa5a8d273a35

  • SHA512

    d40da7049f41ddb6b2e6bb751405385256fd9465101ebcf7af8441f8ffa4733df8528ea6312ca6c3d7e57b1365c4c472215865b978f17ccd11deb13b8bdbf5c8

  • SSDEEP

    3072:GeWBsy+tW4we6Ygz5vEEFV6Q+S19N+sqoi7geA7y9utB5t:GeWBsRE/dYw5FMkj+sNiTA7ptB

Malware Config

Extracted

Family

qakbot

Botnet

tchk08

Campaign

1710958492

C2

77.105.162.176:995

31.210.173.10:443

5.252.177.195:443

Attributes
  • camp_date

    2024-03-20 18:14:52 +0000 UTC

Signatures

  • Detect Qakbot Payload 58 IoCs
  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\userapi.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\System32\wermgr.exe
      C:\Windows\System32\wermgr.exe
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\System32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:2492
      • C:\Windows\System32\whoami.exe
        whoami /all
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2292
      • C:\Windows\System32\nltest.exe
        nltest /domain_trusts /all_trusts
        3⤵
          PID:2900
        • C:\Windows\System32\qwinsta.exe
          qwinsta
          3⤵
            PID:3008
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2788

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Command and Scripting Interpreter

      1
      T1059

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
        Filesize

        242B

        MD5

        9144791833cf641fe17f612c3548e3ab

        SHA1

        8be6c8796273800a0020f8507dd0ba028672cb8d

        SHA256

        5c1ac674f481671c7c88dc915fae159dee4e554474c087287e8dea0a5397840e

        SHA512

        78965a081452ed741bdbe13658d5354d2918011a6ef18ecc1ba08c2cb02711d8782b7fa3d1a0929c685f3d0a873072875565b2bf1bfa2dc9509d9ef2bd78b9ab

      • C:\Users\Admin\AppData\Local\Temp\Cab2703.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar3AC8.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • memory/1284-8-0x0000000180000000-0x000000018002F000-memory.dmp
        Filesize

        188KB

      • memory/3052-34-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-27-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-59-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-26-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-60-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-28-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-30-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-31-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-32-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-33-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-0-0x0000000000090000-0x0000000000092000-memory.dmp
        Filesize

        8KB

      • memory/3052-35-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-36-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-37-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-39-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-40-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-41-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-42-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-43-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-44-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-45-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-46-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-47-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-48-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-77-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-50-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-51-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-52-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-25-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-24-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-49-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-78-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-23-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-10-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-9-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-138-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-139-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-140-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-231-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-232-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-283-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-284-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-7-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-1-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-359-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-360-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-481-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-482-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-531-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-532-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-536-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-537-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-544-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-545-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-546-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-573-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-574-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB

      • memory/3052-576-0x0000000000060000-0x000000000008F000-memory.dmp
        Filesize

        188KB